Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    07/07/2020, 17:21

General

  • Target

    Specification and requirements.exe

  • Size

    536KB

  • MD5

    f162d934161f18deefb2be5f84de2788

  • SHA1

    c9f3f7d7d0b392009417383ac995533cc764a9f3

  • SHA256

    bd8702a0da9bfee55b775c1762d7ea6dbda8ad845abc4bc278fcb49ab6f2658f

  • SHA512

    f3dc245b00b318b84d3729e3279dae7322eb5553bf7d3223a7aa7202ffbd1983063b9bf0691f9d9e3a81d134f3993589c13de60f00baa0a141aeb5a60827a447

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.inbox.ru
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Blackuhuru247

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Specification and requirements.exe
    "C:\Users\Admin\AppData\Local\Temp\Specification and requirements.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Users\Admin\AppData\Local\Temp\Specification and requirements.exe
      "{path}"
      2⤵
        PID:1804
      • C:\Users\Admin\AppData\Local\Temp\Specification and requirements.exe
        "{path}"
        2⤵
          PID:1796
        • C:\Users\Admin\AppData\Local\Temp\Specification and requirements.exe
          "{path}"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1820

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1820-2-0x0000000000400000-0x000000000044C000-memory.dmp

        Filesize

        304KB

      • memory/1820-4-0x0000000000400000-0x000000000044C000-memory.dmp

        Filesize

        304KB

      • memory/1820-5-0x0000000000400000-0x000000000044C000-memory.dmp

        Filesize

        304KB